Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
08-12-2022 00:02
Static task
static1
Behavioral task
behavioral1
Sample
de81ef356acc2e199252f8fe2a894c36c6e327d5efd3abaaa7df477f3942e33b.msi
Resource
win7-20220812-en
General
-
Target
de81ef356acc2e199252f8fe2a894c36c6e327d5efd3abaaa7df477f3942e33b.msi
-
Size
720KB
-
MD5
67d8f0f4203f74c7dc9c3ea8a00ab6b8
-
SHA1
ca6fd6caed882f183bc25963c4ea7f11923d7680
-
SHA256
de81ef356acc2e199252f8fe2a894c36c6e327d5efd3abaaa7df477f3942e33b
-
SHA512
3b71d35bd608d6f1b970faeb641b9347dd48f686295b18ffac96f121c227c203527892ef298705687a9084bd2aca2171b23d52316c337891a63ef00e85c1b366
-
SSDEEP
12288:QwHL0D7lkCPumy9chfA+tl8B0igC+/NHBh1SMHs:lHL01/zyt+b8BtZKBzSE
Malware Config
Extracted
icedid
787509923
kamintrewftor.com
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 3 1656 rundll32.exe 4 1656 rundll32.exe -
Loads dropped DLL 6 IoCs
Processes:
MsiExec.exerundll32.exerundll32.exepid process 1944 MsiExec.exe 688 rundll32.exe 1656 rundll32.exe 1656 rundll32.exe 1656 rundll32.exe 1656 rundll32.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe -
Drops file in Windows directory 15 IoCs
Processes:
DrvInst.exemsiexec.exerundll32.exedescription ioc process File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File created C:\Windows\Installer\6d1efa.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI20AB.tmp-\test.cs.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI20AB.tmp-\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI20AB.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File created C:\Windows\Installer\6d1ef8.ipi msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File created C:\Windows\Installer\6d1ef7.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI20AB.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI20AB.tmp-\WixSharp.dll rundll32.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\6d1ef7.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI540B.tmp msiexec.exe File opened for modification C:\Windows\Installer\6d1ef8.ipi msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 43 IoCs
Processes:
DrvInst.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
rundll32.exemsiexec.exepid process 1656 rundll32.exe 1656 rundll32.exe 892 msiexec.exe 892 msiexec.exe 1656 rundll32.exe 1656 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exevssvc.exeDrvInst.exedescription pid process Token: SeShutdownPrivilege 1960 msiexec.exe Token: SeIncreaseQuotaPrivilege 1960 msiexec.exe Token: SeRestorePrivilege 892 msiexec.exe Token: SeTakeOwnershipPrivilege 892 msiexec.exe Token: SeSecurityPrivilege 892 msiexec.exe Token: SeCreateTokenPrivilege 1960 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1960 msiexec.exe Token: SeLockMemoryPrivilege 1960 msiexec.exe Token: SeIncreaseQuotaPrivilege 1960 msiexec.exe Token: SeMachineAccountPrivilege 1960 msiexec.exe Token: SeTcbPrivilege 1960 msiexec.exe Token: SeSecurityPrivilege 1960 msiexec.exe Token: SeTakeOwnershipPrivilege 1960 msiexec.exe Token: SeLoadDriverPrivilege 1960 msiexec.exe Token: SeSystemProfilePrivilege 1960 msiexec.exe Token: SeSystemtimePrivilege 1960 msiexec.exe Token: SeProfSingleProcessPrivilege 1960 msiexec.exe Token: SeIncBasePriorityPrivilege 1960 msiexec.exe Token: SeCreatePagefilePrivilege 1960 msiexec.exe Token: SeCreatePermanentPrivilege 1960 msiexec.exe Token: SeBackupPrivilege 1960 msiexec.exe Token: SeRestorePrivilege 1960 msiexec.exe Token: SeShutdownPrivilege 1960 msiexec.exe Token: SeDebugPrivilege 1960 msiexec.exe Token: SeAuditPrivilege 1960 msiexec.exe Token: SeSystemEnvironmentPrivilege 1960 msiexec.exe Token: SeChangeNotifyPrivilege 1960 msiexec.exe Token: SeRemoteShutdownPrivilege 1960 msiexec.exe Token: SeUndockPrivilege 1960 msiexec.exe Token: SeSyncAgentPrivilege 1960 msiexec.exe Token: SeEnableDelegationPrivilege 1960 msiexec.exe Token: SeManageVolumePrivilege 1960 msiexec.exe Token: SeImpersonatePrivilege 1960 msiexec.exe Token: SeCreateGlobalPrivilege 1960 msiexec.exe Token: SeBackupPrivilege 1684 vssvc.exe Token: SeRestorePrivilege 1684 vssvc.exe Token: SeAuditPrivilege 1684 vssvc.exe Token: SeBackupPrivilege 892 msiexec.exe Token: SeRestorePrivilege 892 msiexec.exe Token: SeRestorePrivilege 1536 DrvInst.exe Token: SeRestorePrivilege 1536 DrvInst.exe Token: SeRestorePrivilege 1536 DrvInst.exe Token: SeRestorePrivilege 1536 DrvInst.exe Token: SeRestorePrivilege 1536 DrvInst.exe Token: SeRestorePrivilege 1536 DrvInst.exe Token: SeRestorePrivilege 1536 DrvInst.exe Token: SeLoadDriverPrivilege 1536 DrvInst.exe Token: SeLoadDriverPrivilege 1536 DrvInst.exe Token: SeLoadDriverPrivilege 1536 DrvInst.exe Token: SeRestorePrivilege 892 msiexec.exe Token: SeTakeOwnershipPrivilege 892 msiexec.exe Token: SeRestorePrivilege 892 msiexec.exe Token: SeTakeOwnershipPrivilege 892 msiexec.exe Token: SeRestorePrivilege 892 msiexec.exe Token: SeTakeOwnershipPrivilege 892 msiexec.exe Token: SeRestorePrivilege 892 msiexec.exe Token: SeTakeOwnershipPrivilege 892 msiexec.exe Token: SeRestorePrivilege 892 msiexec.exe Token: SeTakeOwnershipPrivilege 892 msiexec.exe Token: SeRestorePrivilege 892 msiexec.exe Token: SeTakeOwnershipPrivilege 892 msiexec.exe Token: SeRestorePrivilege 892 msiexec.exe Token: SeTakeOwnershipPrivilege 892 msiexec.exe Token: SeRestorePrivilege 892 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msiexec.exepid process 1960 msiexec.exe 1960 msiexec.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
msiexec.exeMsiExec.exerundll32.exedescription pid process target process PID 892 wrote to memory of 1944 892 msiexec.exe MsiExec.exe PID 892 wrote to memory of 1944 892 msiexec.exe MsiExec.exe PID 892 wrote to memory of 1944 892 msiexec.exe MsiExec.exe PID 892 wrote to memory of 1944 892 msiexec.exe MsiExec.exe PID 892 wrote to memory of 1944 892 msiexec.exe MsiExec.exe PID 1944 wrote to memory of 688 1944 MsiExec.exe rundll32.exe PID 1944 wrote to memory of 688 1944 MsiExec.exe rundll32.exe PID 1944 wrote to memory of 688 1944 MsiExec.exe rundll32.exe PID 688 wrote to memory of 1656 688 rundll32.exe rundll32.exe PID 688 wrote to memory of 1656 688 rundll32.exe rundll32.exe PID 688 wrote to memory of 1656 688 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\de81ef356acc2e199252f8fe2a894c36c6e327d5efd3abaaa7df477f3942e33b.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\MsiExec.exeC:\Windows\system32\MsiExec.exe -Embedding E92915BBD0BAF3C9C4ADDD27DF8153B62⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Windows\Installer\MSI20AB.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7152021 1 test.cs!Test.CustomActions.MyAction3⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\tmp2750.dll",init4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "000000000000049C" "0000000000000320"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp2750.dllFilesize
269KB
MD5fe23c1657eccf74fc9e485ded167f630
SHA1f707f77dfb0f3f23da5e4dce506b4558208055ad
SHA256afe2b43e94e5d692cef60520a7f7b144cedb1d91fe9b4ad49aa50a3a123c326a
SHA512831324000bde8ca56652465e1ed33ea812369513e930a694a96f82b45b9f7e4aac8a21f5f6206da9dc75b4e38f4cc09f9d9cf71ad15c7ced0e44d7771a705a89
-
C:\Windows\Installer\MSI20AB.tmpFilesize
413KB
MD5b5a9278e30c10a94be5d8c7242eb1542
SHA10b9551bd0f7abc9c0a21014e73c4b5800420aee6
SHA256e1bd934ca2a5b3cfc16f71758ffb0a00ec026eead4693409fa3a3af470935aff
SHA5120f5e9a429c20b9eb089ab928022ea1dc3a45c3ac5b381274c33ff02c9f45bcca05d428db8221928e312540bc064afa7616d21f78ea050af41d2829c8c061161c
-
\Users\Admin\AppData\Local\Temp\tmp2750.dllFilesize
269KB
MD5fe23c1657eccf74fc9e485ded167f630
SHA1f707f77dfb0f3f23da5e4dce506b4558208055ad
SHA256afe2b43e94e5d692cef60520a7f7b144cedb1d91fe9b4ad49aa50a3a123c326a
SHA512831324000bde8ca56652465e1ed33ea812369513e930a694a96f82b45b9f7e4aac8a21f5f6206da9dc75b4e38f4cc09f9d9cf71ad15c7ced0e44d7771a705a89
-
\Users\Admin\AppData\Local\Temp\tmp2750.dllFilesize
269KB
MD5fe23c1657eccf74fc9e485ded167f630
SHA1f707f77dfb0f3f23da5e4dce506b4558208055ad
SHA256afe2b43e94e5d692cef60520a7f7b144cedb1d91fe9b4ad49aa50a3a123c326a
SHA512831324000bde8ca56652465e1ed33ea812369513e930a694a96f82b45b9f7e4aac8a21f5f6206da9dc75b4e38f4cc09f9d9cf71ad15c7ced0e44d7771a705a89
-
\Users\Admin\AppData\Local\Temp\tmp2750.dllFilesize
269KB
MD5fe23c1657eccf74fc9e485ded167f630
SHA1f707f77dfb0f3f23da5e4dce506b4558208055ad
SHA256afe2b43e94e5d692cef60520a7f7b144cedb1d91fe9b4ad49aa50a3a123c326a
SHA512831324000bde8ca56652465e1ed33ea812369513e930a694a96f82b45b9f7e4aac8a21f5f6206da9dc75b4e38f4cc09f9d9cf71ad15c7ced0e44d7771a705a89
-
\Users\Admin\AppData\Local\Temp\tmp2750.dllFilesize
269KB
MD5fe23c1657eccf74fc9e485ded167f630
SHA1f707f77dfb0f3f23da5e4dce506b4558208055ad
SHA256afe2b43e94e5d692cef60520a7f7b144cedb1d91fe9b4ad49aa50a3a123c326a
SHA512831324000bde8ca56652465e1ed33ea812369513e930a694a96f82b45b9f7e4aac8a21f5f6206da9dc75b4e38f4cc09f9d9cf71ad15c7ced0e44d7771a705a89
-
\Windows\Installer\MSI20AB.tmpFilesize
413KB
MD5b5a9278e30c10a94be5d8c7242eb1542
SHA10b9551bd0f7abc9c0a21014e73c4b5800420aee6
SHA256e1bd934ca2a5b3cfc16f71758ffb0a00ec026eead4693409fa3a3af470935aff
SHA5120f5e9a429c20b9eb089ab928022ea1dc3a45c3ac5b381274c33ff02c9f45bcca05d428db8221928e312540bc064afa7616d21f78ea050af41d2829c8c061161c
-
\Windows\Installer\MSI20AB.tmpFilesize
413KB
MD5b5a9278e30c10a94be5d8c7242eb1542
SHA10b9551bd0f7abc9c0a21014e73c4b5800420aee6
SHA256e1bd934ca2a5b3cfc16f71758ffb0a00ec026eead4693409fa3a3af470935aff
SHA5120f5e9a429c20b9eb089ab928022ea1dc3a45c3ac5b381274c33ff02c9f45bcca05d428db8221928e312540bc064afa7616d21f78ea050af41d2829c8c061161c
-
memory/688-60-0x0000000000000000-mapping.dmp
-
memory/688-64-0x00000000020A0000-0x0000000002110000-memory.dmpFilesize
448KB
-
memory/688-63-0x0000000001F50000-0x0000000001F5A000-memory.dmpFilesize
40KB
-
memory/688-62-0x0000000001EA0000-0x0000000001ECE000-memory.dmpFilesize
184KB
-
memory/1656-66-0x0000000000000000-mapping.dmp
-
memory/1656-72-0x00000000002A0000-0x00000000002A9000-memory.dmpFilesize
36KB
-
memory/1944-56-0x0000000000000000-mapping.dmp
-
memory/1960-54-0x000007FEFBD01000-0x000007FEFBD03000-memory.dmpFilesize
8KB